Course Outline

MISA 501 : Assured Business Systems: Managing and Protecting the Information Systems Enterprise

Preview Workflow

Viewing: MISA 501-WW : Assured Business Systems: Managing and Protecting the Information Systems Enterprise

Last approved: Wed, 20 Jan 2016 14:08:40 GMT

Last edit: Wed, 20 Jan 2016 14:08:39 GMT

College of Business (WBUAD)
Assured Business Systems: Managing and Protecting the Information Systems Enterprise
This course provides the two major foundation elements for the MSISA program. It first reviews the many ways in which computation, communications and information systems are used to identify and solve problems, recognize opportunities and generate competitive advantage. It then focuses attention on the importance of assuring that those systems achieve the reliable decision support that organizations require. It does this by looking first at the risks to those systems - risks incurred by their builders and designers through poor design or undisciplined use that can present hackers, criminals and one?s own employees the opportunity to cause harm. It then uses the concepts of the "enterprise perspective" to demonstrate the various information systems used to lead, manage and operate a variety of organizations, while exploring the need for organizations large or small, public or private, to sustain their own existence through continuity planning and risk management.

This course provides the opportunity to review and assess the core competencies of organizational management, quality management and information management. It places information systems engineering in the greater context of making decisions about information risk management, so as to enhance the organization’s ability to survive and achieve its objectives.

Upon course completion, the student will be able to: Understand the core competencies of organizational and business management, and how they apply in an enterprise or “organization-as-system” context. Understand the role of information and decision making in the successful application of these core competencies to achieve organizational objectives. Assess the key driving factors that are causing organizations to develop more dynamic, flexible organizational structures, and the challenges these non-traditional organizational styles present to information systems designers and users. Explain how the principles of information assurance and the enterprise model can be applied to enhance decision support and organizational continuity, even for dynamic, evolving organizations. Understand what business processes are, and how systems engineering principles can and should be applied to generate and assess the performance of business processes – and re-engineer them as and when necessary.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 

Web & Chat:
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428


Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Mike Wills - 2/24/2015
Wendi Kappers - 2/24/2015
Aaron Glassman - 2/24/2015
Dr. Bobby McMasters - 2/24/2015
1-5 Master of Science in Information Security and Assurance 1. Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization
Key: 326